Context aware, pluggable and customizable data protection and de-identification SDK for text and images
-
Updated
Jul 12, 2023 - Python
Context aware, pluggable and customizable data protection and de-identification SDK for text and images
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
MSLA/DLP, file analysis, calibration, repair, conversion and manipulation
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.
This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visually allowing exfiltration of data in air gapped systems
Finding exposed secrets and personal data in GitLab
Strict DLP Chinese (SDC) is a set of strict DLP (Dynamic Leech Protection) DLLs based on the eMule Xtreme Mod's official version. SDC's 5 variants put easyMule v2, easyMule v1 and/or eMule VeryCD Mod into "Soft Ban" or "Hard Ban" list because of GPL violation, private network, community leeching and other behaviors.
Streaming Anomaly Detection Solution by using Pub/Sub, Dataflow, BQML & Cloud DLP
Monitoring GitHub for sensitive data shared publicly
Examples scripts that showcase how to use Private AI Text to de-identify, redact, hash, tokenize, mask and synthesize PII in text.
A browser based GPU accelerated 3D model slicer
This solution provides an automated, serverless way to redact sensitive data from PDF files using Google Cloud Services like Data Loss Prevention (DLP), Cloud Workflows, and Cloud Run.
Advanced Interactive Security Workshop
Last Stop is more than just DLP. On top of our increased security visibility, we enable people to share prompts amongst each other as individuals or as an organization to increase speed to knowledge, building a platform for centralized usage.
Use Remote Functions to tokenize data with DLP in BigQuery using SQL
Add a description, image, and links to the dlp topic page so that developers can more easily learn about it.
To associate your repository with the dlp topic, visit your repo's landing page and select "manage topics."